A couple of resources for beginner hackers

Hacking and phreaking have had a few set-backs over the past decae or so. But things never really change, only the methods needed to achieve those things. Blue boxes and the POTS have been made difficult to utilize, but now there are voice mail systems to break into, even after all the furore about reporters ‘hacking’ celebs’ voice mail accounts; you can listen to other people’s messages, even make phone calls on poorly configured voice mail systems (do a bit of googling about hacking into VMS) – I’m spreading news, not giving tutorials, and anyway I have not the first idea how to do anything illegal! – and you shouldn’t do anything illegal either, I’d never encourage anyone to break the law 🙂

I don't think she should be listening to that!  (pic stolen from http://www.theregister.co.uk

I don’t think she should be listening to that! (pic stolen from http://www.theregister.co.uk

So that’s phreaking still alive and kicking, just in a different form to what older phreaks might recognize. And “hacking”/cracking still lives and kicks too!!! It’s still possible to carry out SQL injection – link (though more companies are getting wise to the tricks and closing the loopholes), malicious websites that put nasties into your computer while you’re browsing asian porn or whatever are thriving, and if you want to be a “proper” hacker who knows how this stuff works under the hood and maybe wants to write your own tools, there are books like Violent Python (pdf download link) out there that can explain some of the nuts and bolts (shh, you didn’t get that link from me!). Amazon says of Violent Python

[It] shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artefacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

High praise indeed. especially when you consider that they’re charging £17 to £18 for the book.

violent-python-cover

For a more gentle and possibly more fun way to learn Python is at Invent Your Own Computer Games With Python (but if you’d rather just have a pdf of their book to read offline it can be gotten here – the book is available under Creative Commons so you don’t need to be antsy about that download at least). A lot of hackers sneer at “script kiddies” who know nothing about programming and who rely on ready-made tools. So fuck em, right? Learn Python – a simple yet powerrul language.

And then there’s the sneaky practice of snatching random strangers’ (or indeed targeted targets’) data off the air when they’re using the net in coffee shops etc. It’s becoming more difficult as people become aware of the danger (for instance if I’m out and about I use https and a VPS) but there are still a lot of possible targets sending bank or card details, or other sensitive info over the air – look here and here for tips and tricks.

So, phreaking and hacking isn’t dead – it’s just grown up a bit. As long as the hacker is also prepared to grow and change, all will be well for the infonauts of the future.

Abby Sciuto is the hacker of the future (and of the present).  I'd love to spend a day/night - KAF-POW! -  in her NCIS lab!!

Abby Sciuto is the hacker of the future (and of the present). I’d love to spend a day/night – KAF-POW! – in her NCIS lab!!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: